Showing results 30741 to 30760 of 275604
Anomaly inflow and holography Hong, Sungwoo; Rigo, Gabriele, JOURNAL OF HIGH ENERGY PHYSICS, no.5, 2021-05 |
Anomaly manifestation of Lieb-Schultz-Mattis theorem and topological phases Cho, Gil Young; Hsieh, Chang-Tse; Ryu, Shinsei, PHYSICAL REVIEW B, v.96, no.19, 2017-11 |
Anomaly prediction ahead tunnel face using tunnel electrical resistivity prospecting system (TEPS) in Danyang Hong, Chang Ho; Cho, Gye-Chun; Hong, Eun-Soo; Baak, Seng-Hyoung; Ryu, Hee-Hwan, ISRM European Rock Mechanics Symposium (EUROCK), pp.855 - 861, Institute of Geonics AS CR, 2017-06 |
Anomaly, wess-zumino term and physical criteria in the chiral schwinger model = 카이랄슈빙거모형의 양자이상, 베스-쥬미노항과 물리적조건link Yi, Sang-Hoon; 이상훈; et al, 한국과학기술원, 1988 |
Anomaly-Aware Adaptation Approach for Self-Adaptive Cyber-Physical System of Systems Using Reinforcement Learning Cho, Eunho; Yeo, Gwangoo; Jee, Eunkyoung; Bae, Doo-Hwan, 2022 17th Annual System of Systems Engineering Conference (SOSE), pp.7 - 12, Institute of Electrical and Electronics Engineers Inc., 2022-06-09 |
Anomaly-aware adaptation approach for self-adaptive cyber-physical system of systems using reinforcement learning = 강화학습 기반 자가 적응 사이버 물리 시스템 오브 시스템즈의 변칙 고려 적응 기법link Cho, Eunho; Bae, Doo-Hwan; et al, 한국과학기술원, 2022 |
ANOMALY-FREE COMPLEX REPRESENTATIONS IN SU(N) EICHTEN, E; KANG, K; Koh, In-Gyu, JOURNAL OF MATHEMATICAL PHYSICS, v.23, no.12, pp.2529 - 2536, 1982 |
Anomaly-mediation and sequestering from a higher-dimensional viewpoint Son, Minho; Sundrum, Raman, JOURNAL OF HIGH ENERGY PHYSICS, no.8, 2008-08 |
Anonymous Authentication Protocol for Dynamic Groups with Power-Limited Devices Kim, J; Choi, S; Kim, Kwangjo; Boyd, C, SCIS2003, pp.405 - 410, SCIS, 2003-01 |
Anonymous fingerprinting as secure as the bilinear Diffie-Hellman assumption Kim, Myungsun; Kim, Jongseong; Kim, Kwangjo, INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2513, pp.97 - 108, 2002 |
Anonymous Fingerprinting as Secure as the Bilinear Diffie-Hellman Assumption Kim, Myungsun; Kim, Jongseong; Kim, Kwangjo, ICICS, 2002 |
Anonymous Participation and Collaboration Efficiency in Online Communities Lee, H.J.; Kim, J.W.; Park, H.J.; Park, Sung Joo, Asia Pacific Journal of Information Systems, v.30, no.3, pp.497 - 512, 2020-09 |
Anormalous above-threshold spontaneous emission in gain-guided VCSELs Shin, JH; Hwang, JK; Ha, KH; Lee, Yong-Hee, International Symposium on Compound Semiconductors, 1995 |
Another approach of financial modelling based on poisson distribution with conditional intensity = 조건부 비율을 가지는 포아송 분포를 바탕으로 한 금융 모델에 관한 연구link Lee, Kyung-sub; 이경섭; et al, 한국과학기술원, 2008 |
Another Dummy Generation Technique in Location-Based Services Do, Hyo Jin; Jeong, Young Seob; Choi, Ho Jin; Kim, Kwangjo, 2016 International Conference on Big Data and Smart Computing (BigComp2016), pp.532 - 538, Korean Institute of Information Scientists and Engineers (KIISE), 2016-01-18 |
Another example of a 3-manifold without tight contact structures = 타이트 컨택 구조가 없는 3차원 다양체의 다른 예link Park, Han-Cheol; 박한철; et al, 한국과학기술원, 2004 |
Another Fuzzy Anomaly Detection System Based on Ant Clustering Algorithm Aminanto, Muhamad Erza; Kim, Hakju; Kim, Kyung-Min; Kim, Kwangjo, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E100A, no.1, pp.176 - 183, 2017-01 |
Another Fuzzy Anomaly Detection System Based on Ant Clustering Algorithm Aminanto, Erza; Kim, HakJu; Kim, Kyungmin; Kim, Kwangjo, 2016 Symposium on Cryptography and Information Security (SCIS 2016), The Institute of Electronics, Information and Communication Engineers (IEICE), 2016-01-20 |
Another Heuristic Procedure for Frequency Assignment in a Cellular Radio System Oh, S.H.; Ma, Joong Soo; Tcha, Dong Wan, Asia Pacific Conf. on Communication, v.2, no.1, pp.120 - 124, 1993-01 |
Another Inventory Model with a Mixture of Backorders and Lost Sales Park, Kyung Soo, NAVAL RESEARCH LOGISTICS, v.30, no.3, 1983-09 |
Discover